首页 > 最新文献

Digital Communications and Networks最新文献

英文 中文
Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model 基于 Wiener-Hammerstein 模型的多波段无源互调数字消除技术
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2024.06.002

Utilizing multi-band and multi-carrier techniques enhances throughput and capacity in Long-Term Evolution (LTE)-Advanced and 5G New Radio (NR) mobile networks. However, these techniques introduce Passive Inter-Modulation (PIM) interference in Frequency-Division Duplexing (FDD) systems. In this paper, a novel multi-band Wiener-Hammerstein model is presented to digitally reconstruct PIM interference signals, thereby achieving effective PIM Cancellation (PIMC) in multi-band scenarios. In the model, transmitted signals are independently processed to simulate Inter-Modulation Distortions (IMDs) and Cross-Modulation Distortions (CMDs). Furthermore, the Finite Impulse Response (FIR) filter, basis function generation, and B-spline function are applied for precise PIM product estimation and generation in multi-band scenarios. Simulations involving 4 carrier components from diverse NR frequency bands at varying transmitting powers validate the feasibility of the model for multi-band PIMC, achieving up to 19 dB in PIMC performance. Compared to other models, this approach offers superior PIMC performance, exceeding them by more than 5 dB in high transmitting power scenarios. Additionally, its lower sampling rate requirement reduces the hardware complexity associated with implementing multi-band PIMC.

利用多频段和多载波技术可提高长期演进(LTE)-高级和 5G 新无线电(NR)移动网络的吞吐量和容量。然而,这些技术会在频分双工(FDD)系统中引入无源互调(PIM)干扰。本文提出了一种新颖的多频段 Wiener-Hammerstein 模型,用于以数字方式重建 PIM 干扰信号,从而在多频段场景中实现有效的 PIM 消除(PIMC)。在该模型中,传输信号经过独立处理,以模拟调制间失真(IMD)和交叉调制失真(CMD)。此外,还应用了有限脉冲响应(FIR)滤波器、基函数生成和 B-样条函数,以便在多频段情况下精确估计和生成 PIM 乘积。仿真涉及不同发射功率下不同 NR 频段的 4 个载波分量,验证了多频段 PIMC 模型的可行性,使 PIMC 性能提高了 19 dB。与其他模型相比,该方法的 PIMC 性能更优越,在高发射功率情况下超出其他模型 5 dB 以上。此外,它对采样率的要求较低,降低了实施多频段 PIMC 的硬件复杂性。
{"title":"Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model","authors":"","doi":"10.1016/j.dcan.2024.06.002","DOIUrl":"10.1016/j.dcan.2024.06.002","url":null,"abstract":"<div><p>Utilizing multi-band and multi-carrier techniques enhances throughput and capacity in Long-Term Evolution (LTE)-Advanced and 5G New Radio (NR) mobile networks. However, these techniques introduce Passive Inter-Modulation (PIM) interference in Frequency-Division Duplexing (FDD) systems. In this paper, a novel multi-band Wiener-Hammerstein model is presented to digitally reconstruct PIM interference signals, thereby achieving effective PIM Cancellation (PIMC) in multi-band scenarios. In the model, transmitted signals are independently processed to simulate Inter-Modulation Distortions (IMDs) and Cross-Modulation Distortions (CMDs). Furthermore, the Finite Impulse Response (FIR) filter, basis function generation, and B-spline function are applied for precise PIM product estimation and generation in multi-band scenarios. Simulations involving 4 carrier components from diverse NR frequency bands at varying transmitting powers validate the feasibility of the model for multi-band PIMC, achieving up to 19 dB in PIMC performance. Compared to other models, this approach offers superior PIMC performance, exceeding them by more than 5 dB in high transmitting power scenarios. Additionally, its lower sampling rate requirement reduces the hardware complexity associated with implementing multi-band PIMC.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864824000695/pdfft?md5=2a6267187794fafdb2d9a61eec6727df&pid=1-s2.0-S2352864824000695-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game theory attack pricing for mining pools in blockchain-based IoT 基于区块链的物联网中矿池的博弈论攻击定价
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2022.11.014

The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network. The employed computing power carries out the pool mining attacks on the attacked mining pool. To realize the win-win game between the malicious mining pool and the employee, the paper proposes an Employment Attack Pricing Algorithm (EAPA) of mining pools in blockchain based on game theory. In the EAPA, the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack, the revenue increment of malicious mining pools, and the revenue of the employee. It establishes a game model between the malicious mining pool and the employee under the employment attack. Then, the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation. In the strategy, the malicious mining pool analyzes the conditions for the employment attack, and uses the derivative method to find the optimal utilization value of computing power, employees analyze the conditions for accepting employment, and use the derivative method to find the optimal reward value of computing power. Finally, the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation. The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee. The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time. The EAPA outperforms the state-of-the-art methods such as SPSUCP, DPSACP, and FPSUCP.

恶意矿池可以牺牲部分收入来使用区块链网络的算力。被雇佣的算力对被攻击的矿池进行挖矿攻击。为了实现恶意矿池与雇员之间的双赢博弈,本文基于博弈论提出了一种区块链矿池雇佣攻击定价算法(EAPA)。在 EAPA 中,本文使用数学公式来表示雇佣攻击下恶意矿池的收益、恶意矿池的收益增量以及雇员的收益。它建立了雇佣攻击下恶意矿池与雇员之间的博弈模型。然后,本文在模型推导的基础上提出了雇佣攻击的最优算力价格选择策略。在该策略中,恶意矿池分析雇佣攻击的条件,并利用导数法求得最优算力利用值;员工分析接受雇佣的条件,并利用导数法求得最优算力奖励值。最后,该策略求出最优雇佣算力价格,实现恶意矿池与员工在当前算力分配下的纳什均衡。仿真结果表明,EAPA 能找到实现恶意矿池与员工双赢博弈的雇佣算力价格。同时,EAPA 还能最大化恶意矿池中雇员的单位算力收益和诚实挖矿的单位算力收益。EAPA 优于 SPSUCP、DPSACP 和 FPSUCP 等最先进的方法。
{"title":"Game theory attack pricing for mining pools in blockchain-based IoT","authors":"","doi":"10.1016/j.dcan.2022.11.014","DOIUrl":"10.1016/j.dcan.2022.11.014","url":null,"abstract":"<div><p>The malicious mining pool can sacrifice part of its revenue to employ the computing power of blockchain network. The employed computing power carries out the pool mining attacks on the attacked mining pool. To realize the win-win game between the malicious mining pool and the employee, the paper proposes an Employment Attack Pricing Algorithm (EAPA) of mining pools in blockchain based on game theory. In the EAPA, the paper uses mathematical formulas to express the revenue of malicious mining pools under the employment attack, the revenue increment of malicious mining pools, and the revenue of the employee. It establishes a game model between the malicious mining pool and the employee under the employment attack. Then, the paper proposes an optimal computing power price selection strategy of employment attack based on model derivation. In the strategy, the malicious mining pool analyzes the conditions for the employment attack, and uses the derivative method to find the optimal utilization value of computing power, employees analyze the conditions for accepting employment, and use the derivative method to find the optimal reward value of computing power. Finally, the strategy finds the optimal employment computing power price to realize Nash equilibrium between the malicious mining pool and the employee under the current computing power allocation. The simulation results show that the EAPA could find the employment computing power price that realizes the win-win game between the malicious mining pool and the employee. The EAPA also maximizes the unit computing power revenue of employment and the unit computing power revenue of honest mining in malicious mining pool at the same time. The EAPA outperforms the state-of-the-art methods such as SPSUCP, DPSACP, and FPSUCP.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002553/pdfft?md5=26d0202549bef1c7dbcc7244a08559ea&pid=1-s2.0-S2352864822002553-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44821926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Downlink network-coded multiple access with diverse power 不同功率的下行网络编码多址接入
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2022.10.027

Normally, in the downlink Network-Coded Multiple Access (NCMA) system, the same power is allocated to different users. However, equal power allocation is unsuitable for some scenarios, such as when user devices have different Quality of Service (QoS) requirements. Hence, we study the power allocation in the downlink NCMA system in this paper, and propose a downlink Network-Coded Multiple Access with Diverse Power (NCMA-DP), wherein different amounts of power are allocated to different users. In terms of the Bit Error Rate (BER) of the multi-user decoder, and the number of packets required to correctly decode the message, the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA (NCMA-C). Meanwhile, the performance of the user with less allocated power is still much better than NCMA-C. Furthermore, the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C. The simulation results demonstrate the remarkable performance of the proposed NCMA-DP.

通常情况下,在下行链路网络编码多址(NCMA)系统中,不同用户的功率是相同的。然而,在某些情况下,例如用户设备有不同的服务质量(QoS)要求时,相同的功率分配并不合适。因此,我们在本文中研究了下行链路 NCMA 系统中的功率分配问题,并提出了下行链路网络编码多路接入(NCMA-DP),其中为不同用户分配了不同的功率。就多用户解码器的误码率(BER)和正确解码信息所需的数据包数量而言,与传统 NCMA(NCMA-C)相比,分配了更多功率的用户的性能大大提高。同时,功率分配较少的用户的性能仍比 NCMA-C 好得多。此外,与 NCMA-C 相比,NCMA-DP 的总体吞吐量也大大提高。仿真结果证明了所提出的 NCMA-DP 的卓越性能。
{"title":"Downlink network-coded multiple access with diverse power","authors":"","doi":"10.1016/j.dcan.2022.10.027","DOIUrl":"10.1016/j.dcan.2022.10.027","url":null,"abstract":"<div><p>Normally, in the downlink Network-Coded Multiple Access (NCMA) system, the same power is allocated to different users. However, equal power allocation is unsuitable for some scenarios, such as when user devices have different Quality of Service (QoS) requirements. Hence, we study the power allocation in the downlink NCMA system in this paper, and propose a downlink Network-Coded Multiple Access with Diverse Power (NCMA-DP), wherein different amounts of power are allocated to different users. In terms of the Bit Error Rate (BER) of the multi-user decoder, and the number of packets required to correctly decode the message, the performance of the user with more allocated power is greatly improved compared to the Conventional NCMA (NCMA-C). Meanwhile, the performance of the user with less allocated power is still much better than NCMA-C. Furthermore, the overall throughput of NCMA-DP is greatly improved compared to that of NCMA-C. The simulation results demonstrate the remarkable performance of the proposed NCMA-DP.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S235286482200236X/pdfft?md5=9a8868063353e0d03e969a256e61f770&pid=1-s2.0-S235286482200236X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47509564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing 基于载波传感的无线局域网在瑞利衰落和阴影条件下的能效感知动态速率和功率自适应
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2022.10.023

We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks (WLANs) in the presence of path loss, Rayleigh fading and log-normal shadowing. For a data packet transmission, we formulate an optimization problem, solve the problem, and propose a rate and transmission power adaptation scheme with a restriction methodology of data packet transmission for achieving the optimal energy efficiency. In the restriction methodology of data packet transmission, a user does not transmit a data packet if the instantaneous channel gain of the user is lower than a threshold. To evaluate the performance of the proposed scheme, we develop analytical models for computing the throughput and energy efficiency of WLANs under the proposed scheme considering a saturation traffic condition. We then validate the analytical models via simulation. We find that the proposed scheme provides better throughput and energy efficiency with acceptable throughput fairness if the restriction methodology of data packet transmission is included. By means of the analytical models and simulations, we demonstrate that the proposed scheme provides significantly higher throughput, energy efficiency and fairness index than a traditional non-adaptive scheme and an existing most relevant adaptive scheme. Throughput and energy efficiency gains obtained by the proposed scheme with respect to the existing adapting scheme are about 75% and 103%, respectively, for a fairness index of 0.8. We also study the effect of various system parameters on throughput and energy efficiency and provide various engineering insights.

我们考虑了在存在路径损耗、瑞利衰落和对数正态阴影的情况下,基于载波传感的无线局域网(WLAN)中用户数据传输速率和传输功率的能效动态适应问题。针对数据包传输,我们提出了一个优化问题,并求解了该问题,同时提出了一种速率和传输功率适应方案,以及一种数据包传输限制方法,以实现最佳能效。在数据包传输限制方法中,如果用户的瞬时信道增益低于阈值,则该用户不传输数据包。为了评估拟议方案的性能,我们开发了分析模型,用于计算拟议方案下 WLAN 的吞吐量和能效,并考虑了饱和流量条件。然后,我们通过仿真验证了分析模型。我们发现,如果包含数据包传输的限制方法,建议方案能提供更好的吞吐量和能源效率,同时具有可接受的吞吐量公平性。通过分析模型和仿真,我们证明了与传统的非自适应方案和现有的最相关自适应方案相比,所提出的方案在吞吐量、能源效率和公平性指数方面都有显著提高。在公平指数为 0.8 的情况下,与现有自适应方案相比,拟议方案的吞吐量和能效分别提高了约 75% 和 103%。我们还研究了各种系统参数对吞吐量和能效的影响,并提供了各种工程见解。
{"title":"Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing","authors":"","doi":"10.1016/j.dcan.2022.10.023","DOIUrl":"10.1016/j.dcan.2022.10.023","url":null,"abstract":"<div><p>We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks (WLANs) in the presence of path loss, Rayleigh fading and log-normal shadowing. For a data packet transmission, we formulate an optimization problem, solve the problem, and propose a rate and transmission power adaptation scheme with a restriction methodology of data packet transmission for achieving the optimal energy efficiency. In the restriction methodology of data packet transmission, a user does not transmit a data packet if the instantaneous channel gain of the user is lower than a threshold. To evaluate the performance of the proposed scheme, we develop analytical models for computing the throughput and energy efficiency of WLANs under the proposed scheme considering a saturation traffic condition. We then validate the analytical models via simulation. We find that the proposed scheme provides better throughput and energy efficiency with acceptable throughput fairness if the restriction methodology of data packet transmission is included. By means of the analytical models and simulations, we demonstrate that the proposed scheme provides significantly higher throughput, energy efficiency and fairness index than a traditional non-adaptive scheme and an existing most relevant adaptive scheme. Throughput and energy efficiency gains obtained by the proposed scheme with respect to the existing adapting scheme are about 75% and 103%, respectively, for a fairness index of 0.8. We also study the effect of various system parameters on throughput and energy efficiency and provide various engineering insights.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002322/pdfft?md5=88dd677b739ec634fe4b8f3902ed5480&pid=1-s2.0-S2352864822002322-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game theory in network security for digital twins in industry 工业数字孪生网络安全的博弈论
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2023.01.004

To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion, a series of discussions on network security issues are carried out based on game theory. From the perspective of the life cycle of network vulnerabilities, mining and repairing vulnerabilities are analyzed by applying evolutionary game theory. The evolution process of knowledge sharing among white hats under various conditions is simulated, and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed. On this basis, the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm (WCA) to produce better replacement individuals with greater probability from the perspective of both attack and defense. Through the simulation experiment, it is found that the convergence speed of the probability (X) of white Hat 1 choosing the knowledge sharing policy is related to the probability (x0) of white Hat 2 choosing the knowledge sharing policy initially, and the probability (y0) of white hat 2 choosing the knowledge sharing policy initially. When y0 ​= ​0.9, X converges rapidly in a relatively short time. When y0 is constant and x0 is small, the probability curve of the “cooperative development” strategy converges to 0. It is concluded that the higher the trust among the white hat members in the temporary team, the stronger their willingness to share knowledge, which is conducive to the mining of loopholes in the system. The greater the probability of a hacker attacking the vulnerability before it is fully disclosed, the lower the willingness of manufacturers to choose the "cooperative development" of vulnerability patches. Applying the improved wolf colony-co-evolution algorithm can obtain the equilibrium solution of the "attack and defense game model", and allocate the security protection resources according to the importance of nodes. This study can provide an effective solution to protect the network security for digital twins in the industry.

为确保工业数字双胞胎网络的安全运行,避免黑客入侵对系统造成危害,基于博弈论对网络安全问题进行了一系列探讨。从网络漏洞的生命周期角度出发,运用演化博弈论对漏洞的挖掘和修复进行了分析。模拟了各种条件下白帽之间知识共享的演化过程,构建了厂商之间漏洞补丁合作开发策略的博弈模型。在此基础上,将差分进化引入狼群算法(WCA)的更新机制,从攻防两端的角度出发,以更大的概率产生更好的替换个体。通过仿真实验发现,白帽子 1 选择知识共享策略的概率(X)的收敛速度与白帽子 2 最初选择知识共享策略的概率(x0)和白帽子 2 最初选择知识共享策略的概率(y0)有关。当 y0 = 0.9 时,X 会在相对较短的时间内迅速收敛。当 y0 恒定且 x0 较小时,"合作开发 "策略的概率曲线收敛为 0。结论是临时团队中白帽成员之间的信任度越高,他们分享知识的意愿就越强,有利于挖掘系统漏洞。黑客在漏洞完全公开之前攻击漏洞的概率越大,制造商选择 "合作开发 "漏洞补丁的意愿就越低。应用改进的狼群协同进化算法可以得到 "攻防博弈模型 "的均衡解,并根据节点的重要性分配安全防护资源。本研究可为保护行业数字孪生网络安全提供有效的解决方案。
{"title":"Game theory in network security for digital twins in industry","authors":"","doi":"10.1016/j.dcan.2023.01.004","DOIUrl":"10.1016/j.dcan.2023.01.004","url":null,"abstract":"<div><p>To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion, a series of discussions on network security issues are carried out based on game theory. From the perspective of the life cycle of network vulnerabilities, mining and repairing vulnerabilities are analyzed by applying evolutionary game theory. The evolution process of knowledge sharing among white hats under various conditions is simulated, and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed. On this basis, the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm (WCA) to produce better replacement individuals with greater probability from the perspective of both attack and defense. Through the simulation experiment, it is found that the convergence speed of the probability (<em>X</em>) of white Hat 1 choosing the knowledge sharing policy is related to the probability (<em>x</em><sub>0</sub>) of white Hat 2 choosing the knowledge sharing policy initially, and the probability (<em>y</em><sub>0</sub>) of white hat 2 choosing the knowledge sharing policy initially. When <em>y</em><sub>0</sub> ​= ​0.9, <em>X</em> converges rapidly in a relatively short time. When <em>y</em><sub>0</sub> is constant and <em>x</em><sub>0</sub> is small, the probability curve of the “cooperative development” strategy converges to 0. It is concluded that the higher the trust among the white hat members in the temporary team, the stronger their willingness to share knowledge, which is conducive to the mining of loopholes in the system. The greater the probability of a hacker attacking the vulnerability before it is fully disclosed, the lower the willingness of manufacturers to choose the \"cooperative development\" of vulnerability patches. Applying the improved wolf colony-co-evolution algorithm can obtain the equilibrium solution of the \"attack and defense game model\", and allocate the security protection resources according to the importance of nodes. This study can provide an effective solution to protect the network security for digital twins in the industry.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000172/pdfft?md5=e4bd0604e0a430227120098d1040c077&pid=1-s2.0-S2352864823000172-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48849586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid millimeter wave heterogeneous networks with spatially correlated user equipment 具有空间相关用户设备的混合毫米波异构网络
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2022.10.022

In this paper, we analyze a hybrid Heterogeneous Cellular Network (HCNet) framework by deploying millimeter Wave (mmWave) small cells with coexisting traditional sub-6GHz macro cells to achieve improved coverage and high data rate. We consider randomly-deployed macro base stations throughout the network whereas mmWave Small Base Stations (SBSs) are deployed in the areas with high User Equipment (UE) density. Such user centric deployment of mmWave SBSs inevitably incurs correlation between UE and SBSs. For a realistic scenario where the UEs are distributed according to Poisson cluster process and directional beamforming with line-of-sight and non-line-of-sight transmissions is adopted for mmWave communication. By using tools from stochastic geometry, we develop an analytical framework to analyze various performance metrics in the downlink hybrid HCNets under biased received power association. For UE clustering we considered Thomas cluster process and derive expressions for the association probability, coverage probability, area spectral efficiency, and energy efficiency. We also provide Monte Carlo simulation results to validate the accuracy of the derived expressions. Furthermore, we analyze the impact of mmWave operating frequency, antenna gain, small cell biasing, and BSs density to get useful engineering insights into the performance of hybrid mmWave HCNets. Our results show that network performance is significantly improved by deploying millimeter wave SBS instead of microwave BS in hot spots.

本文分析了一种混合异构蜂窝网络(HCNet)框架,通过部署毫米波(mmWave)小基站与共存的传统 6GHz 以下宏基站,实现更好的覆盖和更高的数据传输速率。我们考虑在整个网络中随机部署宏基站,而毫米波小基站(SBS)则部署在用户设备(UE)密度高的区域。这种以用户为中心的毫米波 SBS 部署不可避免地会在 UE 和 SBS 之间产生相关性。在现实场景中,UE 按照泊松集群过程分布,毫米波通信采用视距和非视距传输的定向波束成形。通过使用随机几何工具,我们开发了一个分析框架,用于分析下行链路混合 HCNets 在有偏差的接收功率关联下的各种性能指标。对于 UE 聚类,我们考虑了托马斯聚类过程,并推导出了关联概率、覆盖概率、区域频谱效率和能效的表达式。我们还提供了蒙特卡罗模拟结果,以验证推导表达式的准确性。此外,我们还分析了毫米波工作频率、天线增益、小基站偏置和基站密度的影响,从而获得了有关混合毫米波 HCN 网络性能的有用工程见解。我们的研究结果表明,在热点地区部署毫米波 SBS 而不是微波 BS 可以显著提高网络性能。
{"title":"Hybrid millimeter wave heterogeneous networks with spatially correlated user equipment","authors":"","doi":"10.1016/j.dcan.2022.10.022","DOIUrl":"10.1016/j.dcan.2022.10.022","url":null,"abstract":"<div><p>In this paper, we analyze a hybrid Heterogeneous Cellular Network (HCNet) framework by deploying millimeter Wave (mmWave) small cells with coexisting traditional sub-6GHz macro cells to achieve improved coverage and high data rate. We consider randomly-deployed macro base stations throughout the network whereas mmWave Small Base Stations (SBSs) are deployed in the areas with high User Equipment (UE) density. Such user centric deployment of mmWave SBSs inevitably incurs correlation between UE and SBSs. For a realistic scenario where the UEs are distributed according to Poisson cluster process and directional beamforming with line-of-sight and non-line-of-sight transmissions is adopted for mmWave communication. By using tools from stochastic geometry, we develop an analytical framework to analyze various performance metrics in the downlink hybrid HCNets under biased received power association. For UE clustering we considered Thomas cluster process and derive expressions for the association probability, coverage probability, area spectral efficiency, and energy efficiency. We also provide Monte Carlo simulation results to validate the accuracy of the derived expressions. Furthermore, we analyze the impact of mmWave operating frequency, antenna gain, small cell biasing, and BSs density to get useful engineering insights into the performance of hybrid mmWave HCNets. Our results show that network performance is significantly improved by deploying millimeter wave SBS instead of microwave BS in hot spots.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002310/pdfft?md5=973cc82a3f5ad2909702271a161a3652&pid=1-s2.0-S2352864822002310-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42234446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-driven human and bot recognition from web activity logs based on hybrid learning techniques 基于混合学习技术的基于web活动日志的数据驱动的人和机器人识别
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2023.01.020

Distinguishing between web traffic generated by bots and humans is an important task in the evaluation of online marketing campaigns. One of the main challenges is related to only partial availability of the performance metrics: although some users can be unambiguously classified as bots, the correct label is uncertain in many cases. This calls for the use of classifiers capable of explaining their decisions. This paper demonstrates two such mechanisms based on features carefully engineered from web logs. The first is a man-made rule-based system. The second is a hierarchical model that first performs clustering and next classification using human-centred, interpretable methods. The stability of the proposed methods is analyzed and a minimal set of features that convey the class-discriminating information is selected. The proposed data processing and analysis methodology are successfully applied to real-world data sets from online publishers.

区分机器人和人类产生的网络流量是评估在线营销活动的一项重要任务。其中一个主要挑战与性能指标的部分可用性有关:虽然有些用户可以明确地被归类为机器人,但在许多情况下,正确的标签并不确定。这就需要使用能够解释其决定的分类器。本文展示了基于从网络日志中精心设计的特征的两种此类机制。第一个是基于规则的人工系统。第二种是分层模型,首先进行聚类,然后使用以人为本的可解释方法进行分类。对所提出方法的稳定性进行了分析,并选择了一组能传达类别区分信息的最小特征。建议的数据处理和分析方法已成功应用于在线出版商的真实数据集。
{"title":"Data-driven human and bot recognition from web activity logs based on hybrid learning techniques","authors":"","doi":"10.1016/j.dcan.2023.01.020","DOIUrl":"10.1016/j.dcan.2023.01.020","url":null,"abstract":"<div><p>Distinguishing between web traffic generated by bots and humans is an important task in the evaluation of online marketing campaigns. One of the main challenges is related to only partial availability of the performance metrics: although some users can be unambiguously classified as bots, the correct label is uncertain in many cases. This calls for the use of classifiers capable of explaining their decisions. This paper demonstrates two such mechanisms based on features carefully engineered from web logs. The first is a man-made rule-based system. The second is a hierarchical model that first performs clustering and next classification using human-centred, interpretable methods. The stability of the proposed methods is analyzed and a minimal set of features that convey the class-discriminating information is selected. The proposed data processing and analysis methodology are successfully applied to real-world data sets from online publishers.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000330/pdfft?md5=7b3f54c3278291b4e66a9f8a51c80437&pid=1-s2.0-S2352864823000330-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42752038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Position-aware packet loss optimization on service function chain placement 基于位置感知的业务功能链丢包优化
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2023.01.002

The advent of Network Function Virtualization (NFV) and Service Function Chains (SFCs) unleashes the power of dynamic creation of network services using Virtual Network Functions (VNFs). This is of great interest to network operators since poor service quality and resource wastage can potentially hurt their revenue in the long term. However, the study shows with a set of test-bed experiments that packet loss at certain positions (i.e., different VNFs) in an SFC can cause various degrees of resource wastage and performance degradation because of repeated upstream processing and transmission of retransmitted packets.

To overcome this challenge, this study focuses on resource scheduling and deployment of SFCs while considering packet loss positions. This study developed a novel SFC packet dropping cost model and formulated an SFC scheduling problem that aims to minimize overall packet dropping cost as a Mixed-Integer Linear Programming (MILP) and proved that it is NP-hard. In this study, Palos is proposed as an efficient scheme in exploiting the functional characteristics of VNFs and their positions in SFCs for scheduling resources and deployment to optimize packet dropping cost. Extensive experiment results show that Palos can achieve up to 42.73% improvement on packet dropping cost and up to 33.03% reduction on average SFC latency when compared with two other state-of-the-art schemes.

网络功能虚拟化(NFV)和服务功能链(SFC)的出现释放了利用虚拟网络功能(VNF)动态创建网络服务的力量。这引起了网络运营商的极大兴趣,因为从长远来看,服务质量差和资源浪费可能会损害他们的收入。然而,该研究通过一组测试平台实验表明,SFC 中某些位置(即不同的 VNF)的数据包丢失会造成不同程度的资源浪费和性能下降,因为要重复上游处理和传输重新传输的数据包。这项研究建立了一个新颖的 SFC 丢包成本模型,并以混合整数线性规划(MILP)的形式提出了一个旨在最小化总体丢包成本的 SFC 调度问题,并证明该问题具有 NP 难度。在这项研究中,Palos 作为一种高效方案被提出,它利用 VNF 的功能特性及其在 SFC 中的位置来调度资源和部署,从而优化丢包成本。广泛的实验结果表明,与其他两种最先进的方案相比,Palos 可将丢包成本提高 42.73%,将 SFC 平均延迟降低 33.03%。
{"title":"Position-aware packet loss optimization on service function chain placement","authors":"","doi":"10.1016/j.dcan.2023.01.002","DOIUrl":"10.1016/j.dcan.2023.01.002","url":null,"abstract":"<div><p>The advent of Network Function Virtualization (NFV) and Service Function Chains (SFCs) unleashes the power of dynamic creation of network services using Virtual Network Functions (VNFs). This is of great interest to network operators since poor service quality and resource wastage can potentially hurt their revenue in the long term. However, the study shows with a set of test-bed experiments that packet loss at certain positions (i.e., different VNFs) in an SFC can cause various degrees of resource wastage and performance degradation because of repeated upstream processing and transmission of retransmitted packets.</p><p>To overcome this challenge, this study focuses on resource scheduling and deployment of SFCs while considering packet loss positions. This study developed a novel SFC packet dropping cost model and formulated an SFC scheduling problem that aims to minimize overall packet dropping cost as a Mixed-Integer Linear Programming (MILP) and proved that it is NP-hard. In this study, <em>Palos</em> is proposed as an efficient scheme in exploiting the functional characteristics of VNFs and their positions in SFCs for scheduling resources and deployment to optimize packet dropping cost. Extensive experiment results show that <em>Palos</em> can achieve up to 42.73% improvement on packet dropping cost and up to 33.03% reduction on average SFC latency when compared with two other state-of-the-art schemes.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000160/pdfft?md5=f29887ba5852bc0c526d0fa622929345&pid=1-s2.0-S2352864823000160-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48388018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards privacy-preserving and efficient word vector learning for lightweight IoT devices 为轻量级物联网设备实现保护隐私的高效词向量学习
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2022.10.019

Nowadays, Internet of Things (IoT) is widely deployed and brings great opportunities to change people's daily life. To realize more effective human-computer interaction in the IoT applications, the Question Answering (QA) systems implanted in the IoT services are supposed to improve the ability to understand natural language. Therefore, the distributed representation of words, which contains more semantic or syntactic information, has been playing a more and more important role in the QA systems. However, learning high-quality distributed word vectors requires lots of storage and computing resources, hence it cannot be deployed on the resource-constrained IoT devices. It is a good choice to outsource the data and computation to the cloud servers. Nevertheless, it could cause privacy risks to directly upload private data to the untrusted cloud. Therefore, realizing the word vector learning process over untrusted cloud servers without privacy leakage is an urgent and challenging task. In this paper, we present a novel efficient word vector learning scheme over encrypted data. We first design a series of arithmetic computation protocols. Then we use two non-colluding cloud servers to implement high-quality word vectors learning over encrypted data. The proposed scheme allows us to perform training word vectors on the remote cloud servers while protecting privacy. Security analysis and experiments over real data sets demonstrate that our scheme is more secure and efficient than existing privacy-preserving word vector learning schemes.

如今,物联网(IoT)已得到广泛应用,并为改变人们的日常生活带来了巨大机遇。为了在物联网应用中实现更有效的人机交互,植入物联网服务的问题解答(QA)系统理应提高理解自然语言的能力。因此,包含更多语义或句法信息的词的分布式表示在问答系统中发挥着越来越重要的作用。然而,学习高质量的分布式单词向量需要大量的存储和计算资源,因此无法在资源有限的物联网设备上部署。将数据和计算外包给云服务器是一个不错的选择。不过,直接将私人数据上传到不可信的云端可能会带来隐私风险。因此,在不受信任的云服务器上实现词向量学习过程而不泄露隐私是一项紧迫而又具有挑战性的任务。本文提出了一种新颖高效的加密数据词向量学习方案。我们首先设计了一系列算术计算协议。然后,我们使用两个非共轭云服务器在加密数据上实现高质量的词向量学习。所提出的方案允许我们在远程云服务器上进行词向量训练,同时保护隐私。对真实数据集的安全性分析和实验证明,我们的方案比现有的保护隐私的词向量学习方案更安全、更高效。
{"title":"Towards privacy-preserving and efficient word vector learning for lightweight IoT devices","authors":"","doi":"10.1016/j.dcan.2022.10.019","DOIUrl":"10.1016/j.dcan.2022.10.019","url":null,"abstract":"<div><p>Nowadays, Internet of Things (IoT) is widely deployed and brings great opportunities to change people's daily life. To realize more effective human-computer interaction in the IoT applications, the Question Answering (QA) systems implanted in the IoT services are supposed to improve the ability to understand natural language. Therefore, the distributed representation of words, which contains more semantic or syntactic information, has been playing a more and more important role in the QA systems. However, learning high-quality distributed word vectors requires lots of storage and computing resources, hence it cannot be deployed on the resource-constrained IoT devices. It is a good choice to outsource the data and computation to the cloud servers. Nevertheless, it could cause privacy risks to directly upload private data to the untrusted cloud. Therefore, realizing the word vector learning process over untrusted cloud servers without privacy leakage is an urgent and challenging task. In this paper, we present a novel efficient word vector learning scheme over encrypted data. We first design a series of arithmetic computation protocols. Then we use two non-colluding cloud servers to implement high-quality word vectors learning over encrypted data. The proposed scheme allows us to perform training word vectors on the remote cloud servers while protecting privacy. Security analysis and experiments over real data sets demonstrate that our scheme is more secure and efficient than existing privacy-preserving word vector learning schemes.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864822002280/pdfft?md5=69163c8cc8c0fd1dd38ce15845d9e704&pid=1-s2.0-S2352864822002280-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semi-supervised learning based hybrid beamforming under time-varying propagation environments 时变传播环境下基于半监督学习的混合波束形成
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2023.01.018

Hybrid precoding is considered as a promising low-cost technique for millimeter wave (mm-wave) massive Multi-Input Multi-Output (MIMO) systems. In this work, referring to the time-varying propagation circumstances, with semi-supervised Incremental Learning (IL), we propose an online hybrid beamforming scheme. Firstly, given the constraint of constant modulus on analog beamformer and combiner, we propose a new broad-network-based structure for the design model of hybrid beamforming. Compared with the existing network structure, the proposed network structure can achieve better transmission performance and lower complexity. Moreover, to enhance the efficiency of IL further, by combining the semi-supervised graph with IL, we propose a hybrid beamforming scheme based on chunk-by-chunk semi-supervised learning, where only few transmissions are required to calculate the label and all other unlabelled transmissions would also be put into a training data chunk. Unlike the existing single-by-single approach where transmissions during the model update are not taken into the consideration of model update, all transmissions, even the ones during the model update, would make contributions to model update in the proposed method. During the model update, the amount of unlabelled transmissions is very large and they also carry some information, the prediction performance can be enhanced to some extent by these unlabelled channel data. Simulation results demonstrate the spectral efficiency of the proposed method outperforms that of the existing single-by-single approach. Besides, we prove the general complexity of the proposed method is lower than that of the existing approach and give the condition under which its absolute complexity outperforms that of the existing approach.

在毫米波(mm-wave)大规模多输入多输出(MIMO)系统中,混合预编码被认为是一种前景广阔的低成本技术。在这项工作中,我们针对时变传播环境,通过半监督增量学习(IL),提出了一种在线混合波束成形方案。首先,考虑到模拟波束成形器和合路器模数恒定的约束条件,我们提出了一种新的基于宽网络结构的混合波束成形设计模型。与现有的网络结构相比,所提出的网络结构能实现更好的传输性能和更低的复杂度。此外,为了进一步提高 IL 的效率,我们将半监督图与 IL 结合起来,提出了一种基于逐块半监督学习的混合波束成形方案,在这种方案中,只需要少量传输来计算标签,其他所有未标记的传输也将被放入一个训练数据块中。与现有的单次方法不同的是,在模型更新过程中的传输不会被纳入模型更新的考虑范围,而在建议的方法中,所有传输,即使是模型更新过程中的传输,都会对模型更新做出贡献。在模型更新过程中,未标记的传输量非常大,它们也携带了一些信息,这些未标记的信道数据可以在一定程度上提高预测性能。仿真结果表明,所提方法的频谱效率优于现有的逐单方法。此外,我们还证明了所提方法的一般复杂度低于现有方法,并给出了其绝对复杂度优于现有方法的条件。
{"title":"Semi-supervised learning based hybrid beamforming under time-varying propagation environments","authors":"","doi":"10.1016/j.dcan.2023.01.018","DOIUrl":"10.1016/j.dcan.2023.01.018","url":null,"abstract":"<div><p>Hybrid precoding is considered as a promising low-cost technique for millimeter wave (mm-wave) massive Multi-Input Multi-Output (MIMO) systems. In this work, referring to the time-varying propagation circumstances, with semi-supervised Incremental Learning (IL), we propose an online hybrid beamforming scheme. Firstly, given the constraint of constant modulus on analog beamformer and combiner, we propose a new broad-network-based structure for the design model of hybrid beamforming. Compared with the existing network structure, the proposed network structure can achieve better transmission performance and lower complexity. Moreover, to enhance the efficiency of IL further, by combining the semi-supervised graph with IL, we propose a hybrid beamforming scheme based on chunk-by-chunk semi-supervised learning, where only few transmissions are required to calculate the label and all other unlabelled transmissions would also be put into a training data chunk. Unlike the existing single-by-single approach where transmissions during the model update are not taken into the consideration of model update, all transmissions, even the ones during the model update, would make contributions to model update in the proposed method. During the model update, the amount of unlabelled transmissions is very large and they also carry some information, the prediction performance can be enhanced to some extent by these unlabelled channel data. Simulation results demonstrate the spectral efficiency of the proposed method outperforms that of the existing single-by-single approach. Besides, we prove the general complexity of the proposed method is lower than that of the existing approach and give the condition under which its absolute complexity outperforms that of the existing approach.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000317/pdfft?md5=15e51103139c8d2d6b5c8e5d6603104c&pid=1-s2.0-S2352864823000317-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47745189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Digital Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1